x86/Intel: hide CPUID faulting capability from guests
authorJan Beulich <jbeulich@suse.com>
Mon, 19 Sep 2016 09:37:09 +0000 (11:37 +0200)
committerJan Beulich <jbeulich@suse.com>
Mon, 19 Sep 2016 09:37:09 +0000 (11:37 +0200)
commitb982a5bea4273a4b9fc007d5046bed8d1669c07f
tree473d342e36e7bd889da5fa979dbab9465ff6cf7e
parent6559a686ae77bca2539d826120c9f3bd0d75cdf8
x86/Intel: hide CPUID faulting capability from guests

We don't currently emulate it, so guests should not be misguided to
believe they can (try to) use it.

For now, simply return zero to guests for platform MSR reads, and only
accept (by discarding) writes of zero. If ever there will be bits we
can safely expose to guests, let's handle them by white listing.

(As a side note - according to SDM version 059 bit 31 is reserved on
all known families.)

Reported-by: Kyle Huey <me@kylehuey.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Andrew Cooper <andrew.cooper3@citix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
xen/arch/x86/hvm/vmx/vmx.c
xen/arch/x86/traps.c